Ongoing investment in cybersecurity solutions continues to grow. According to the latest worldwide market study by Canalys, cybersecurity solutions for public cloud and 'as a service' accelerated in the first quarter of 2019. Those deployment models collectively grew 46 percent year-on-year.

These type of solutions accounted for 17.6 percent of the total cybersecurity market value -- that's up from 13.8 percent in the same period a year ago. Virtual security appliances and agent solutions also...

What do we mean by edge computing? In a nutshell, with edge computing you are processing data near the edge of your network, where the data is being generated, instead of relying on the cloud - or, more specifically, a collection of data centres.

As a relatively new methodology, computing at the edge invites new security challenges as you are looking at new setups or new architecture. Some say...

Keeping your organisation secure in a device- and data-heavy world is tougher than ever. Utilising cloud and artificial intelligence (AI) technologies can lead to various issues – recent coverage has spoken of the problems of hackers ‘hijacking’ AI technology, for instance – but it can also...

Digital transformation initiatives require a distinct technological and cultural change – and the element which binds both together is skills.

Yet getting the right skills remain a near-impossibility. The skills gap shows no sign of lessening, with two recent studies proving this point. In December OpsRamp found the vast majority of businesses

It is another case of mind the gap, according to McAfee: while the vast majority of companies are seeing some level of business acceleration through their cloud initiatives, only a fraction are exploiting its full potential.

The security provider has released a special edition of its Cloud and Risk Adoption Report, which polled 1,000 enterprise organisations worldwide alongside collating data from anonymised cloud events across its...

In today’s complex business ecosystem, the relationship between the CIO and the CFO has to be closely aligned, which goes beyond just an agreement on the budget. The CIO and the CFO have to be as one, working together as two strong pillars that ensure the organisation meets every demand the regulators, shareholders, customers, partners and employees place on it. The days of tension between the CIO and CFO are long gone.

Over the past few years, companies have been rapidly transitioning to dynamic, hybrid cloud environments in a bid to keep up with the constant demand to deliver something new. However, while the cloud provides the agility businesses crave, the ever-changing nature of these environments has generated unprecedented levels of complexity for IT teams to tackle.

Bottom line: One of the primary factors motivating employees to sacrifice security for speed are the many frustrations they face, attempting to re-authenticate who they are so they can get more work done and achieve greater productivity.

How bad security experiences lead to a breach

Every business is facing the paradox of hardening security without sacrificing users’ login and system access experiences.

Multi-cloud is one of the biggest initiatives for enterprises today; however, if you analyse the justification for this trend, so much of it is driven by fear — fear of lock-in, fear of outages, fear of cost. And while those concerns may be valid, the enterprises that are realising the value of multi-cloud have an even more compelling reason for it: choice.

A few years ago, battle lines were drawn. For the most part you either used AWS, Azure, or GCP in addition...

Cloud computing has utterly transformed the IT industry, requiring organisations to make fundamental changes to how they design, deploy, manage and optimise their security strategy. Many organisations, however, are simply using the same security model they have relied on for over a decade in their traditional networks to the cloud. But true cloud security requires more than deploying isolated cloud-enabled network security tools to protect cloud-based resources.

The future...

Over the next two years, cloud service providers will be systematically sabotaged by attackers aiming to disrupt critical national infrastructure (CNI) or cripple supply chains. Organisations dependent on cloud services will find their operations and supply chains undermined when key cloud services go down for extended periods of time.

Nation states that engage in a digital cold war will aim to disrupt economies and take down CNI by sabotaging cloud infrastructure through traditional physical attacks or by...

Cloud security best practices are improving - but there is still a long way to go, according to a new report from SANS Institute.

The study, which polled several hundred respondents across the IT spectrum, came about, as author Dave Shackleford put it, as the result of concerning news stories around the security space. IDC found back in April that worldwide IT security spending would hit $103.1 billion by the end of...

Cybersecurity investment continues to be a top priority for most IT organizations. Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019 -- that's an increase of 9.4 percent over 2018. The pace of growth will continue as industries invest heavily in IT security solutions to meet a wide range of cyber threats.

According to the latest market study by International Data Corporation (IDC), worldwide spending on IT security solutions will achieve a...

Cloud access security broker (CASB) Bitglass has announced a $70 million (£53.6m) funding round aimed at consolidating its leadership of the CASB and cloud security market.

The round, a series D, included a new investor in the shape of Quadrille Capital, as well as existing investors Future Fund, New Enterprise Associates (NEA), Norwest, and Singtel Innov8. NEA, as regular readers of this publication will be aware, is a regular investor in the cloud space, with...

For new digital business models to succeed, customers’ privacy preferences need to be secure, and that begins by treating every identity as a new security perimeter.

Organisations need to recognise that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats. Until they start implementing identity-centric security measures, account compromise attacks will continue to provide a perfect camouflage for data breaches.

The move to hybrid cloud is one which virtually every industry is undertaking – but the financial services industry is getting there ahead of most.

According to the latest data issued by Nutanix for its Enterprise Cloud Index Report, more than one in five financial organisations polled (21%) are deploying a hybrid cloud model today. This is up from the global average of 18.5%. 91% of those polled said hybrid cloud was their ‘ideal’ IT...

Researchers at security firm UpGuard have disclosed two separate instances of Facebook user data being exposed to the public internet – and it again asks questions of the strategy regarding cloud security and shared responsibility.

Categories

Cloud Tech promotes industry thought leadership content from industry brands, businesses and analysts, partnering with writers and bloggers to deliver insight and advice on cloud IT strategy to our extensive audience of CIOs and IT managers.